An Automated Surveillance System based on Multi-Processor System ...

2 downloads 0 Views 916KB Size Report
This paper proposes a specific System On Chip architecture for surveillance system based on Multi-Processor. (MPSOC) and hardware accelerator. The aim is ...
(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No. 9, 2017

An Automated Surveillance System based on Multi-Processor System-on-Chip and Hardware Accelerator Mossaad Ben Ayed College of Science and Humanities at AlGhat, Al Majmaah University, Kingdom of Saudi Arabia Sfax University, Tunisia

SabeurElkosantini

Mohamed Abid

College of Engineering, King Saud University Kingdom of Saudi Arabia

National School of Engineers of Sfax University of Sfax, Tunisia

Abstract—The video surveillance, such as an example of security system presents one of the powerful techniques used in advanced systems. Manual vision which is used to analyze video in the traditional approach should be avoided. An automated surveillance system based on suspicious behavior presents a great challenge to developers. The detection is encountered by complexity and time-consuming process. An abnormal behavior could be identified by different ways: actions, face, trajectory, etc. The characteristics of an abnormal behavior still presents a great problem. This paper proposes a specific System On Chip architecture for surveillance system based on Multi-Processor (MPSOC) and hardware accelerator. The aim is to accelerate the processing and obtain a reliable and accelerated suspicious behavior recognition. Finally, the experiment section proves the opportunity of the proposed system in terms of performance and cost. Keywords—Surveillance system; suspicious behaviors; multiprocessor; accelerator; architecture

I.

INTRODUCTION

Nowadays, our lifetime is widely conditioned by different surveillance systems. All of them are increasingly monitored by computers. The main goal of surveillance system is identifying suspicious or undesirable behaviors such as thefts and looting with intent [1]. By definition, an abnormal action or behavior represents a suspicious behavior which could menace human life by different way as freedom, privacy, health, and properties [2]. Developers propose three essential steps (see Fig. 1) to recognize the suspicious behavior: object detection, tracking, and behavior exploration.

system depends on it to ameliorate the recognition rate. A comparison among the main background subtraction methods is used to detect objects. Then the tracking step is essential to define trajectory or behavior kind/type. Several algorithms are used in literature but the results are not always satisfactory [3]. This paper focuses on a specific case: detect the attempt of theft or scam in the case of Automated Teller Machine (ATM) security surveillance. This detection is performed by the exploration of a tracking and squatting action. The second challenge was the design of a real-time surveillance system. It is known that video/image processing requires a specific architecture to obtain real-time results. In this paper, we present different techniques used to accelerate speed execution and we propose an attempt based on Datadriven Error Correcting Output Coding (DECOC) classifier to ensure the real-time execution. To sum up, existing surveillance systems suffer from several issues:

The first challenge was to define models to recognize a suspicious behavior. An anomalous behavior did not represent a simple action or behavior, but it is defined by some simple actions which present a complex behavior. Therefore, a suspicious behavior did not have a standard pattern and the recognition phase is challenged by the accuracy of the abnormal detection. Different related works are presented in the next section. They aimed to find an automated method to analyze suspicious behavior and to replace traditional monitors. The detection of an object presents the first step in suspicious behavior recognition system which the whole

Video streaming

Object detection

Tracking

Behavior exploration

Decision Fig. 1. Suspicious behavior’s recognition steps.

59 | P a g e www.ijacsa.thesai.org

(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No. 9, 2017

1) The most traditional method of surveillance is based on manual/visual detection [4]. 2) Most of today’s surveillance is not used to prevent an incident but it is only used to identify what has already happened [5]. 3) Most of surveillance systems suffer from no real-time detection of suspicious behavior. This problem is due to the complexity of algorithm [5]. 4) Surveillance system violates the privacy of citizens. For example, in the USA, many groups such as NSA “National Security Agency”, are against the use of surveillance system in public area [6].

is based on semi-automated video-surveillance systems [7]. As mentioned in the previous section, each suspicious behavior recognition is essentially composed of three steps: object detection, tracking, and behavior exploration.

In the light of this brief introduction on suspicious behavior based on surveillance system, this paper purports to contribute to the following tentative proposals:

As a conclusion, we can say that the object detection is well done using subtraction method with the background [13].

1) Proposes an embedded intelligent camera for real-time execution. The intelligent camera ensures the privacy of citizens because all the treatments will be done in camera. 2) Applies the proposed design with respect to ATM system. The present paper will be planned as follows: The related work will be discussed in Section 2. Section 3 presents the basic concepts in terms of algorithm for surveillance system. Section 4 proposes a special design using MPSOC approach and hardware accelerator. The experimental results and accuracy analysis are exhibited in Section 5. Finally, Section 6 concludes the paper. II. RELATED WORK The recognition of activities is targeted by multitude applications, especially suspicious behavior. Therefore, the presented field presents a point of interest for several researchers. In literature, conducting studies attempt to define the characteristics of an anomalous behavior and propose different techniques to analyze the detected behavior [2]. This section is divided into two parts: 1) literature review for the suspicious behavior recognition algorithm; 2) literature review for real-time architecture for surveillance system. A. Suspicious Behavior Recognition Algorithms Video surveillance systems get through especially three phases in literature. The first phase uses analog Closed-Circuit Television (CCTV) and the automation is little exploited (1960-1980). The second phase is based on computer vision using digital CCTVs (1980-2000). From 2000, the third phase

1) There is a huge number related to objects detection, but algorithm still suffers from the complexity due to different specific situations. One of the most used methods for object detection is the subtraction of the background [8], [9]. Other works based on the last method are improved by formulated technique [10]. Multi-layer background subtraction which represents another method based on color and texture [11]. Second works are based on segmentation algorithms [12].

2) Tracking methods are widely described in previous works. But these works still suffer from low accuracy because of the difficulty of generic algorithms. Tracking object system is used in many fields as: crowded environment [14], traffic situation [15] and maritime surveillance [16]. In the field of surveillance, the essential goal of the tracking object is to analyze or to extract the human behavior: trajectory, gesture, event [13], [17], [18]. 3) Hierarchical methods and single layered methods are the two principle categories of the suspicious behavior recognition algorithms [2], [19]. The first is suitable for gesture recognition and the second is adopted for complex activities (Fig. 2). 4) Based on the model of the human activities, single layered methods are divided into: space time methods [2], [20]-[23] and sequential methods [2], [24]-[26]. In the space time method, the video is composed of a set of frames. Indeed, the local description based on trajectories extraction was used in recognizing behavior [2]. While in sequential method, the video is considered as a sequence of observation. Indeed, exemplar based methodologies is used for recognition [2]. Statistical methods [27], description-based methods [29], [30], and syntactic methods [28] present the constituent of hierarchical methods [2]. But all the previous works do not respect the real-time exigence due to the enormous amount of computation required [31].

Behavior recognition approaches

Single layered

Space time

Hierarchical

Sequential

Statistical

Syntactic

Description

Fig. 2. Different behavior recognition approaches.

60 | P a g e www.ijacsa.thesai.org

(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No. 9, 2017

B. Real-time Detection based on Hardware Acceleration The video processing is faced with not only the complexity of recognition algorithms but also the complexity of hardware architecture. Recognition algorithms request specific and advanced hardware components to avoid the loss of information and the non-real-time execution. [5]. There are various works of research that propose an advanced architecture in the field of video-surveillance. In [32] a co-design strategy is adopted with Field-Programmable Gate Array (FPGA) to ensure automated video surveillance in the case of the object detection. Other works focus on embedded cameras for tracking systems [33], [34]. In [32], [35], [36], advanced designs are proposed to accelerate the detection of human motion. This brief review attempted to show the principle challenges faced by surveillance systems especially the low accuracy of tracking and the non-real-time detection. The present paper proposes an accelerated architecture for suspicious behavior. III. BASIC CONCEPTS: OBJECT DETECTION AND TRACKING Object detection and tracking is the main purpose of any surveillance system. In this section, a brief survey about different used algorithms is presented. Its main goal is to make a comparison between methods and purposes. In literature, several algorithms of object detections and tracking was presented. In this section, some shortcomings and limitations were discussed. Wang et al., [37] propose Incremental Multiple Principle Component Analysis (MPCA) algorithm for detection and tracking. Based on the time sequence, this method manages the variation of image’s streams. To ensure online learning, a dynamic tensor defined by object’s geometric presentation is used. It aims to find the relationship between image’s matrices. Then Bays’ interference framework is applied. Eigen tracking algorithm is modeled as a learning method. But this algorithm suffers from non-real-time execution [44]. Babenko et al. [38], propose a novel algorithm named Frag Track (FT). This algorithm tries to track an object from video advance. The object is represented by multiple fragments of an image. FT algorithm determines the histogram of an object in every position and each position is compared to histogram of the original object. The integral datagram structure is used by FT algorithm. It determines multiple regions based on the extraction result of the histogram. FT algorithm overcomes essentially three problems. First, it reduces the cost of computation. Second, FT uses pixel intensities based on spatial distribution. Third, FT occurs the partial occlusions [44]. Wang et al. [39], combine two algorithms to ensure object detection: Local Binary Pattern (LBP) and Histogram of Oriented Gradients (HOG). The proposed algorithm attempts to remove partial occlusions. This is ensured by using global and part detectors which scans the whole frames and the local regions. The mean shift technique is applied using maximum likelihood method to remove occlusions [43].

Co-Training Framework of Generative and Discriminative Trackers algorithm is proposed by Dinh et al. [40]. Authors propose the last algorithm to improve the detection of occlusion regions. A low dimension sub space is used by generative model to encode variation. And a Support Vector Machine (SVM) combined with HOG is used to provide discriminative model [44]. Grabner et al., [41] propose Semi Supervised Support Vector Machines (SSSVM) algorithm. This method tracks any object found in background and foreground in the frame. A semi supervised classifier used by the co-training framework, combines object’s features to treat a new sample. This process provides an easy object detection and an easy separation with the background [44]. SVM is a complete computational procedure described in [42] and [43] with full details. It follows five process. In the first step, the SVM vectors with τ generation ensures training. Secondly, it looks for the input image. Thirdly, the SVM resize the image and apply normalization step. Fourthly, it starts classification. Finally, a filtration step is applied to decrease noise [45]. Equation (1) presents the model of the classification algorithm: ∑

(

)



(

)

( )

Where the sphere radius is presented by . The supportive vectors derived in a training step are and . is an input pixel. The classifier compares the input pixel with all the support vectors. Then it determines if the input pixel belong to the inside of the sphere. A Gaussian kernel was used for implementation [45]. ‖ Where



2

(2)

is a propagate of the kernel.

SSSVM algorithm solves all drawbacks occurred from the previous algorithms. It provides mainly a robust tracking. Furthermore, it combines between generative and discriminative model to track the object. Moreover, SSSVM mange easily the object types [43]. In the light of this brief review, algorithms based on SVM provide more accuracy than other detections and tracking algorithms. In the next section, a complete HW description will be described with sufficient details. IV. PROPOSED SURVEILLANCE SYSTEM: MODELING AND SIMULATION Embedded system is used in different fields as industries, surveillance, smart cities, intelligent systems, etc. There are several environments for modeling and simulation depending on level description and field system. Architecture based on FPGAs boards presents an attractive platform for surveillance system not only to ensure real-time exigence but also to support the complexity of used algorithms.

61 | P a g e www.ijacsa.thesai.org

(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No. 9, 2017

The proposed architecture is based on multi-processor approach. FPGA offers flexibility to implement a specific architecture based on MPSOC in a single chip.

proposed architecture is composed of three main functional blocks: Object detection Unit, Tracking Unit and Behavior exploration application. The first and the second are hardware components and they will be supported by a special purpose architecture described in Fig. 5. The third is a software application written in C language and executed by the principal processor of the controller unit.

Fig. 3 shows the block diagram of the proposed hardware architecture. A pipelined multi-processor is used to speed up execution and to improve the precision computation. The

Digital video

Memory Controller Block

Video acquisition controller

Controller Unit

Write_port

Read_port Write_port

Ethernet Controller

HDMI port

Read_port Write_port

Object detection Unit

Ethernet Port

DVI controller

mem video

mem Behavior Exploration

Tracking Unit

Buffer FPGA

Fig. 3. Block diagram of the architecture.

Controller Unit

Scheduler Unit

Application

Processor Element 1

Frame 2

Object detection

Memory 1

Camera Processor Element 2

Tracking

Memory 2

Global Memory

Frame 1

Memory 3

SVM_HA Frame n Control signal Bus

Data signal Scheduling signal

Fig. 4. Multi-processor based SVM Hardware Accelerator architecture for surveillance system.

62 | P a g e www.ijacsa.thesai.org

(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No. 9, 2017

The memory controller block is supported by an external DDR2 memory interface. It contains five ports three of which are used for writing and the rest is used for reading. Buffers are used to avoid frame artifacts. The Controller unit represents the main component in the proposed design. It ensures different services:

respects real-time constraints. The kernel performs the main function and collaborates with SVM hardware accelerator. Fig. 6 shows the block diagram of SVM Hardware accelerator composed by classification part with collaboration of an internal memory. Supportive Vectors are fetched from an external memory.

 Divides frame into three slices.

Slice_In

Slice_Out

Buffer_In

Buffer_Out

 Arbitrates the access processors elements to/from memory.  Manages processor elements status: idle, stopped, started, and running.  Executes the application code of the behavior exploration. SVM

PE

The internet interface is tied to the computer. This interface is added to visualize operations saved in the buffer. The High-Definition Multimedia Interface (HDMI) is added to display output and verify the accuracy of the proposed architecture. Fig. 4 shows the kernel architecture.

Kernel obj_detec

(a) Block diagram of object detection unit.

The proposed MPSOC architecture belongs to Single Instruction Multiple Data (SIMD) field [42]. The communication between different components is ensured by bus based on three signals: control signal, data signal, and scheduling signal. The scheduling unit manages slices in relation to kernels. The SVM_HA is a hardware accelerator described in Fig. 6.

Slice_In

Slice_Out

Buffer_In

Buffer_Out

PE

Fig. 5 shows the architecture of object detection (a) and tracking (b). The proposed is a MPSOC approach based on Processor Element (PE) coupled with a SVM hardware accelerator. It aims to speed-up the classification step and

SVM

Kernel tracking

(b) Block diagram of tracking unit. Fig. 5. Block diagram of processing unit.

Internal Memory 𝛼

𝛾

𝑋𝑖0 Squared

Subtraction

𝑋𝑥0

𝑋𝑖𝑁

1

𝑋𝑥𝑁

1

Subtraction

Sum

. . .

Exponential

Sum

Y

Squared

Classification Fig. 6. Block diagram of SVM hardware accelerator.

63 | P a g e www.ijacsa.thesai.org

(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No. 9, 2017

V. EXPERIMENT RESULTS

TABLE I.

The implementation of the surveillance system using a hybrid architecture based on multi-processor and SVM based on a hardware accelerator is discussed in this section. The proposed architecture in the previous section is implemented on an Altera DE2-115 board shown in Fig. 7 [42]. The FPGA reads the video stream from the USB camera Microsoft LifeCam Studio Q2F-00016 (see Fig. 8) with a resolution of 640 x 480 pixels. The purpose of this work is to obtain a real-time execution of the surveillance system using two NIOS II processors, hardware accelerator, and distributed memory. In this work, detection object design and tracking design were written in VHSIC Hardware Description Language (VHDL) and were synthesized from a Register Transfer Level (RTL) model. Behavior exploration algorithm has written in C language. Then algorithm’s optimization is applied to support the embedded MPSOC model. The FPGA platform involves 32 bits NIOS II processor, 64 KB of on-chip Random Access Memory (RAM) for buffers, and 32 KB of on-chip RAM for behavior exploration as a software application. To summarize, our design involves two NIOS II soft-core processors, a hardware accelerator, and a shared memory which present the design kernel. Control, data, and scheduling signals are ensured by the AVALON bus1. The design kernel’s clock is running at 100 MHz. The AVALON bus is clocked at 50 MHz. The video acquisition controller is clocked at 73.6 MHz, the HDMI controller at 25 MHz, and the Ethernet controller at 125 MHz.

Resource Type Object detection unit Tracking Unit Behavior Exploration module TABLE II. Resource type Combinational ALUT Memory ALUT Logic Registers Total Pins Total block memory bits DSP block PLL

FPGA OCCUPATION

Logic elements 4752/39600 (12%) 1188/39600 (3%) 0/39600 (0%)

Total memory bits 499323/1161216 (43%) 220631/1161216 (19%) 232651/1161216 (20%)

DSP elements 0/252 (0%) 0/252 (0%) 58/252 (23%)

RESOURCES AND SPACE REPORT Occupation 101990/424960 63/212480 89241/424960 302/888 17411604/21233664 133/1024 2/8

Rate 24% 0.29% 21% 34% 82% 13% 25%

The resource requirements for each VHDL entity are indicated in Table 1. A Digital Signal Processor (DSP) element is the main processor type of the controller unit. The FPGA occupation report proves that the configuration choices are selected to suport the specific requirements of the proposed application. The application uses 5940 logic elements inside the FPGA. The total blocks memory bits provided by the board is equal to 21233664. Based on results shown in Table 2, 24% of logic elements on FPGA is used by the design and 82% of memory is occupied. Timing Analyzer tool evaluates the real-time performance of the system based on results of each processing step. The processing time is computed in microseconds. Table 3 indicates the time delay between two consecutive frames. The results prove that the total processing time is about 81.140 ms. Therefore, the proposed system could run at 120 frames per second. This time delay presents much opportunity to speed-up execution time and ensures real-time processing. TABLE III.

THE AVERAGE COMPUTATION TIME BY FRAME PROCESSING.

Processing step Object detection Tracking Behavior exploration

Fig. 7. DE2-115 Board.

TABLE IV. Resources Memory controller PLL Detection object unit Tracking unit Ethernet controller Video acquisition Video display Input/output blocks Clock network Leakage Total

Fig. 8. Microsoft LifeCam Studio camera.

1

Number of the points 841 307 4093

Execution time (µs) 584.346 203.817 80351.849

THE DISSIPATION POWER OF THE FPGA RESOURCE Power (mW) 342 156 143 98 14 6 9 406 189 85 1448

http://www.ee.ryerson.ca/~courses/coe608/labs/DE2_115_User_Manual.pdf.

64 | P a g e www.ijacsa.thesai.org

(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No. 9, 2017

Based on results of the power analysis and optimization tool, the entire system spends 1.448 W of power, where 768 mW are dissipated by our design, as mentioned in line one of the Table 4. This power dissipation is overpowered by the memory controller (342 mW). 426 mW presents the used power by all the processing modules. The total power dissipation (680 mW) indicated in line two in Table 4 presents the complete setup power. It is composed by the FPGA, Ethernet physical I/O chip and DDR2 external memory. VI. CONCLUSION This paper sums up the different automated surveillance system in the literature. The goal is to obtain a reliable detection of suspicious behavior with respect to the real-time constraint for ATM system. This successful attempt proposes a hybrid architecture based on multi-processor and hardware accelerator to speed-up the processing time. The presented special-purpose hardware architecture for surveillance system was performed. The implanted prototype achieves low-cost in terms of FPGA scales. The accuracy has a double precision in comparison with software implementation. The frame rate of the prototype is 120fps, and the overpowered is 768mW. The discussed results of the previous section prove the special architecture based not only on MPSOC approach but also on SVM-based Hardware Accelerator. The different performance features ensure accuracy with a real-time exigency. In future work, the system will be extended to implement multi-camera in the context of Internet of Things (IOT) application. ACKNOWLEDGMENT The author would like to thank Deanship of Scientific Research at Majmaah University for funding this work. [1] [2]

[3]

[4] [5]

[6] [7]

[8]

[9]

REFERENCES “Surveillance”, chapter 22 in Computer and Machine Vision, 2012. M. Chundi, J. Xie, W. Yan, T. Liu, and P. Li, “A fast recognition algorithm for suspicious behavior in high definition videos”, Multimedia Systems, 2015. R. Arroyo, J. J. Yebes, L. M. Bergasa, I. G. Daza, and J. Almazan, “Expert video-surveillance system for real-time detection of suspicious behaviors in shopping malls”, Expert systems with Applications, Vol. 42, pp 7991-8005, 2015. R. Shimonski, "Digital reconnaissance and surveillance", chapter 1 in cyber reconnaissance, surveillance and defense, 2014. L. Deligiannidis, and H. R. Arabnia, “Security surveillance applications utilizing parallel video-processing techniques in the spatial domain”, chapter 8 in Emerging Trends in Image Processing, Computer Vision and Pattern Recognition, 2015. Online: https://www.eff.org/nsa-spying T. D. Raty, “Survey on contemporary remote surveillance systems for public safety”, IEEE Transactions on Systems, Man and Cybernetics Part C, Vol. 40, pp. 493–515, 2010. L. D.Stefano,C. S.Regazzoni, and D. Schonfeld, “Advanced video-based surveillance”, EURASIP Journal on Image and Video Processing (JIVP), 2011. S. Brutzer, B. Hoferlin, and G. Heidemann, “Evaluation of background subtraction techniques for video surveillance”, IEEE conference on computer vision and pattern recognition, pp. 1937–1944, 2011.

[10] L. Maddalena, andA. Petrosino, “A self-organizing approach to background subtraction for visual surveillance applications”, IEEE Transactions on Image Processing, Vol 17, pp. 1168–1177, 2008. [11] J.M. Odobez, andJ. Yao, “Multi-layer background subtraction based on color and texture”, IEEE conference on computer vision and pattern recognition, pp. 1–8, 2007. [12] F.E. Baf, T. Bouwmans,andB. Vachon, “Background modeling using mixture of gaussians for foreground detection - a survey”, Recent Patents on Computer Science, pp. 219–237, 2008. [13] R. Arroyo, J. J. Yebes, L. M. Bergasa, G. Daza, and J. Almazn, “Expert video-surveillance system for real-time detection of suspicious behaviors in shopping malls”, Expert Systems with Applications,Vol. 42,pp. 7991–8005, 2015. [14] Chau, M. Thonnat,F. Bremond,and E. Corvee, “Online parameter tuning for object tracking algorithms”, Image and Vision Computing, Vol 32, pp. 287–302, 2014. [15] S. Alvarez,D. Llorca, and M. Sotelo, “Hierarchical camera autocalibration for traffic surveillance systems”, Expert Systems With Applications (ESWA), Vol. 41, pp. 1532–1542, 2014. [16] Z.L. Szpak, andJ.R. Tapamo, “Maritime surveillance: Tracking ships inside a dynamic background using a fast level-set”, Expert Systems With Applications, Vol. 38, pp. 6669–6680, 2011. [17] M. Cristani,R. Raghavendra, A. Del Bue, and V. Murino, “Human behavioranalysis in video surveillance: A social signal processing perspective”,Neurocomputing, Vol. 100, pp. 86–97, 2012. [18] W. Hu,T. Tan,L. Wang, andS. Maybank, “A survey on visual surveillance ofobject motion and behaviors”, IEEE Transactions on Systems, Man and CyberneticsPart C, Vol 34, pp. 334–352, 2004. [19] J.K.Aggarwal, andM.S.Ryoo, “Human activity analysis: a review”, Journal ACM computing surveys, Vol. 43, 2011. [20] Rao, and M. Shah,“View-invariance in action recognition”,Conference on Computer Vision and Pattern Recognition, 2001. [21] S. Savarese,A. Delpozo, J. Niebles,and L. Fei-Fei,“Spatial-temporal correlations for unsupervised action classification”, Workshop on Motion and Video Computing, 2008. [22] M.D. Rodriguez, J. Ahmed, and M. Shah,“Action MACH: a spatiotemporal maximum average correlation height filter for action recognition”, Conference on Computer Vision and Pattern Recognition, 2008. [23] M.S. Ryoo, and J.K Aggarwal, “Spatio-temporal relationship match: video structure comparison for recognition of complex human activities”,International Conference on Computer Vision, 2009. [24] H. Jiang,M. Drew,and Z. Li,“Successive convex matching for action detection”,Conference on Computer Vision and Pattern Recognition, 2006. [25] A.Veeraraghavan,R. Chellappa,and A. Roy-Chowdhury,“The function space of an activity”, Conference on Computer Vision and Pattern Recognition, 2006. [26] P. Natarajan, and R. Nevatia,“Coupled hidden semi-markov models for activity recognition”,Workshop on Motion and Video Computing, 2007. [27] Damen,and D. Hogg,“Recognizing linked events: searching the space of feasible explanations”,Conference on Computer Vision and Pattern Recognition, 2009. [28] S.W. Joo, and R. Chellappa,“Attribute grammar-based event recognition and anomaly detection”, Conference on Computer Vision and Pattern Recognition, 2006. [29] M.S. Ryoo, and J.K. Aggarwal,“Semantic representation and recognition of continued and recursive human activities”, International Journal of Computer Vision, 2009. [30] M.S. Ryoo, and J.K. Aggarwal, “Recognition of composite human activities through context-free grammar based representation”, Conference on Computer Vision and Pattern Recognition, 2006. [31] C. Mu, J. Xie, W. Yan, and T. Liu, “A fast recognition algorithm for suspicious behavior in high definition videos”, Multimedia Systems, Vol(22), pp 275-285, 2016.

65 | P a g e www.ijacsa.thesai.org

(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No. 9, 2017 [32] D. Wang, H. Lu, and Y.-W. Chen, “Incremental MPCA for color object tracking,” IEEE International Conference Pattern Recognition, pp. 1751–1754, 2010. [33] B. Babenko, M.-H. Yang, and S. Belongie, “Visual tracking with online multiple instance learning,” IEEE Conference Computation Vision Pattern Recognition, pp. 983–990, 2009. [34] X. Wang, T. X. Han, and S. Yan, “An HOG-LBP human detector with partial occlusion handling”, IEEE International Conference Computation Vision, pp. 32–39, 2009. [35] T. B. Dinh and G. G. Medioni, “Co-training framework of generative and discriminative trackers with partial occlusion handling”, IEEE Workshop Application Computation Vision, pp. 642–649, 2011. [36] T.N. Hau, W.I. Robert, N.R. Ryan, and P.B. Randy, “Real-time video surveillance on an embedded, programmable platform”, Microprocessors and Microsystems, Vol. 37, pp. 562–571, 2013. [37] M. Casares, and S. Velipasalar, “Resource-efficient salient foreground detection forembedded smart cameras by tracking feedback”, IEEE Conferenceon Advanced Video and Signal Based Surveillance, pp. 369– 375, 2010. [38] J. Schlessman, C.Y. Chen, B. Ozer, K. Fujino, K. Itoh,and W. Wolf, “Hardware/software co-design of an FPGA-based embedded tracking

[39]

[40]

[41]

[42] [43]

[44]

[45]

system”, Conference on Computer Vision and Pattern Recognition Workshop, pp. 123–130, 2006. H. Meng,C. Freeman, N. Pears, and C. Bailey, “Real-time human action recognition on an embedded, reconfigurable video processing architecture”, Journal of Real-Time Image Processing, Vol. 3, pp.163– 176, 2008. B.M.A Amer, and S.A.R Al-Attas, “Smart surveillance using PDA, Word Academy of Science”, Engineering and Technology,Vol. 66, pp.251–255, 2010. D. Watson, A. Ahmadinia, “Memory customisations for image processing applications targeting MPSoCs”, Integration, the VLSI Journal, Vol. 51, pp. 72-80, 2015. V.N. Vapnik, “The Nature of Statistical Learning Theory”, Springer, 2000. A.Ben-Hur, D. Horn, H.T Siegelmann, V. Vapnik, “A support vector clustering method”, 15th International Conference on , pp.724-727, 2000. K. Rasool Reddy, K. Hari Priya, N. Neelima. “Object Detection and Tracking -- A Survey”, International Conference on Computational Intelligence and Communication Networks (CICN), 2015. M. Wielgosz. “FPGA Implementation of the Selected Parts of the Fast Image Segmentation”, Studies in Computational Intelligence, 2012

66 | P a g e www.ijacsa.thesai.org

Suggest Documents